Tags
Attribution
🛡️Security Research
Incidents
Capita data leak
DepositFiles exposed config file
Darkbeam data exposure
Reuters leaky ElasticSearch DB
Microsoft AI data exposure
Package hijacking redteam op
Optimeyes data leak
Mercedes-Benz source code exposure
From S3 bucket to Jenkins credential dump
From code commit to production takeover
Football Australia exposed cloud key in website
fsevents supply chain attack
Apple cloud key exposure
WinStar exposed app database
US military email server exposure
BlueKai exposed database
Zenlayer exposed database
U.S. Internet exposed email server
BMW exposed cloud storage
Juniper support portal exposure
Würk exposed database
From refresh token theft to global admin
Fujitsu exposed bucket
Hugging Face cross-tenant access
Microsoft exposed storage with credentials
Microsoft credential exposure on GitHub
US DoD NIPRNet access via Atlassian SSRF
US DOI PII exfiltration pentest
From writable bucket to credential theft
Utah “Bathroom Bill” open database
Multiple organizations vulnerable to dependency confusion
Last edited
Dec 14, 2023 7:35 PM
Status
Finalized
Cloud-fluent
Some incidents are the result of security research, with the findings responsibly disclosed to the affected organization.